Enhanced Security Clause Samples
The Enhanced Security clause establishes additional measures or requirements to protect sensitive information, assets, or systems beyond standard security protocols. In practice, this may involve implementing advanced encryption, multi-factor authentication, or stricter access controls for certain data or operations. Its core function is to mitigate heightened security risks by ensuring that particularly valuable or vulnerable resources receive a higher level of protection than usual.
POPULAR SAMPLE Copied 1 times
Enhanced Security. Enhanced Security leverages a foundational component of the Internet called Domain Name System (“DNS”). DNS is a system that automatically translates Internet addresses to the numeric addresses used by computers, smartphones, and tablet devices. Enhanced Security manages a dynamic list of known Internet addresses that have security threats, updated in near real time. When an attempt is made to connect to a compromised website, the connection is not completed, and the “blocked” page notice is shown. The Services also include a network level, cloud-based malware defence. The malware defence is not a firewall and you are responsible for all device-level security.
Enhanced Security. In addition to the requirement of 3.4(a) above, confidentiality of Device Keys shall be protected via (a) implementation of Proactive Renewal or (b) a method that is clearly designed to prevent attempts to discover or reveal such values solely using electronically distributable means.
Enhanced Security. Requests transmitted via Bank’s Business Online Banking Service must comply with the Security Protocol described, and agreed to, in the Agreement and the Business Online Banking Service Terms with respect to Entries transmitted by Company to Bank, including the use of Tokens. Company acknowledge that the purpose of such Security protocol is for verification of authenticity and not to detect an error in the transmission or content of a request. No Security Protocol for the detection of any such error has been agreed upon by Bank and Company. Company is solely responsible for the security of login credentials and tokens. Bank will have no duty to further verify the identity of any electronic user with login credentials and tokens. Confirmation of Outgoing Wire Transfers shall be verified and approved by Company prior to their transmission to Bank. Bank recommends a minimum of two Users to confirm Wire Transfer Payment Orders and that Users serve as an initiator or confirmer, but not both. Notwithstanding Bank’s recommendations, if Company permit a User to act as both initiator and confirmer, Company hereby authorize Bank to process a wire initiated and confirmed by such User and accepts the risk of an unauthorized Wire Transfer Payment Order. If a Request (or a Request for cancellation or amendment of a Wire Transfer) received by Bank purports to have been transmitted or authorized by Company, it will be deemed effective as Company’ request and Company shall be obligated to pay Bank the amount of such Wire Transfer even though the Request was not authorized by Company, provided Bank accepted the request in good faith and acted in compliance with the Security protocol with respect to such request. If a request (or request for cancellation or amendment of a Wire Transfer) received by Bank was transmitted by Company or a designated User, Company shall pay Bank the amount of the Wire Transfer, whether or not that request was erroneous in any respect or that error would have been detected if Bank had complied with such procedures.
Enhanced Security. 4.8.1 The Supplier and their Sub-Contractors shall provide a higher level of security, where specified, throughout the processes they perform directly and those that they sub-contract to, so as not to compromise the identity of the vehicles, the identity of the drivers and the operational effectiveness.
4.8.2 The Supplier shall comply with the Contracting Authority’s personnel vetting policy and standard operating procedures.
4.8.3 The Supplier shall provide a list of personnel who will have access to the Contracting Authority’s data, including both Suppliers own personnel and Third Party contractors, in a format as specified by the Contracting Authority.
4.8.4 The Supplier shall ensure that any Blue Light vehicles in its possession must have its identifiers (e.g. livery, signage and Blue Light bar) camouflaged and covered at all times.
4.8.5 The Supplier shall ensure that dealers/repairers involved with Contracting Authority vehicles must adhere to the vehicle in transit instructions.
Enhanced Security. BITEEU may offer optional enhanced security features for User’s BITEEU Account (including, for example, two-factor authentication). BITEEU encourages, but may not require, User to use any such enhanced security features. If User does enable enhanced security features, it is User’s responsibility to ensure the security of, and User’s continuous control over, any device or account that may be associated with the enhanced security features. User hereby agrees that: (a) User will notify BITEEU immediately if User is aware of any unauthorized use of User’s BITEEU Account and password by any person or any other violations to the security rules;
Enhanced Security. Requests transmitted via Bank’s Digital Banking Service must comply with the Security Protocol described, and agreed to, in the Digital Banking Service Terms with respect to Entries transmitted by Customer to Bank, including the use of Tokens. Customer acknowledges that the purpose of such Security Protocol is for verification of authenticity and not to detect an error in the transmission or content of a Request. No Security Protocol for the detection of any such error has been agreed upon by Bank and Customer. Customer is solely responsible for the security of Login Credentials and Tokens. Bank will have no duty to further verify the identity of any electronic user with Login Credentials and Tokens.
Enhanced Security. Security is key to all our public cloud deployments. However, in some scenarios further enhancements may be necessary in order to meet compliance or assurance requirements. Enhanced Security provides longer log data retention, benchmarking to CIS Level 2, defence in depth configuration, higher quantity and quality alerting with automation on a 24x7 basis, GCP Cloud Armor configuration, and enhanced endpoint protection. We will review your cloud architecture quarterly, providing security/compliance recommendations and upgrades. Enhanced Security is only available for customers that also buy Enhanced Support.
Enhanced Security. 8.7.1 A number of the Contracting Body(s) vehicles are involved in law enforcement and covert operations that require a higher level of security in addition to the security requirements detailed in Clause 34 (Security and Protection of Information) and Schedule 8 (Security) of the Model Call- Off terms and conditions. In order to ensure that the Contracting Body(s) personal safety and the operation the vehicle is involved in are not put at risk it is essential that the Supplier and their Sub-Contractors safeguard all information relating to the Contracting Body(s) vehicle fleet.
8.7.2 The Supplier and their Sub-Contractors shall be required to provide a higher level of security, as agreed with the Contracting Body(s), throughout the processes they perform directly and those that they sub-contract so as not to compromise the identity of the vehicles, the identity of the drivers and the operational effectiveness. This may include the requirement to keep the Contracting Body(s) details anonymous and in some cases adopting a pseudonym name for use by the Supplier and their Sub-Contractors.
8.7.3 The Supplier shall comply with the Contracting Body(s) personnel vetting policy and standard operating procedures.
8.7.4 The Supplier shall be expected to provide a list of personnel who will access the Contracting Body(s) data and communicate via all available means with the Contracting Body(s) personnel and third party repairers as part of the fleet management function.
8.7.5 The Supplier shall notify the Contracting Body(s) in writing of any changes to the allocated personnel within 5 working days and the new personnel will only be granted access to customer data and/or vehicles upon satisfactory vetting clearance from the Contracting Body(s).
8.7.6 The Supplier shall ensure that they and all third party repairers, service providers and suppliers apply adequate and proper security controls and conform to the Contracting Body(s) enhanced security requirements when in temporary possession of the Contracting Body(s) vehicles and any other asset requiring this level of security.
Enhanced Security. LTE Fixed Wireless Access Services include Enhanced Security, which leverages a foundational component of the Internet called Domain Name Server (DNS). DNS is a system that automatically translates Internet addresses to the numeric addresses used by computers, smartphones, and tablet devices. Enhanced Security manages a dynamic list of known Internet addresses that have security threats, updated in near real time. When an attempt is made to connect to a compromised site, the connection is not completed and the “blocked” page notice is shown.
Enhanced Security a. Due to aging equipment and variable printer models, not all printers support “Pcounter” secure printing hardware and software, a security protocol that requires AHS staff use their ID badges to process print jobs thereby ensuring the privacy of sensitive documents.
b. To address this security risk, AHS will upgrade the printer fleet to ensure all printers meet security requirements including ID badge- based printing.
